Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
in
Module Overview
www.technocorp.co.in
Configuring and Troubleshooting File Shares Encrypting Network Files with EFS Encrypting Partitions with BitLocker Configuring and Troubleshooting Network Printing
www.technocorp.co.in
Change
Read Access file shares by using: A UNC path Mapped drive letter
In the demonstration, you will see how to: Create a file share by using simplified interface Create a file share by using advanced sharing Configure advanced sharing for a file share
In this demonstration, you will see how to: Configure NTFS permissions View advanced NTFS permissions View inherited permissions
www.technocorp.co.in
Hides files and folder that you do not have read access to
Is enabled automatically when sharing is enabled using the simplified sharing interface
www.technocorp.co.in
Combines multiple commands into a single request Windows Server 2008 R2 includes SMB 2.1: Client oplock leasing
Large MTU support Better support for sleep modes
What Is EFS? How EFS works Recovering EFS Encrypted Files Demonstration: How to Encrypt a File by Using EFS
What Is EFS?
www.technocorp.co.in
EFS is a feature that can encrypt files stored on an
www.technocorp.co.in
Public key encryption is used to protect the symmetric key User certificate with public key and private key Also certificate of recovery agent
EFS
In this demonstration, you will see how to: Verify that a computer account supports EFS on a network share Use EFS to encrypt a file on a network share View the certificate used for encryption Test access to an encrypted file
What Is BitLocker? How BitLocker Works Recovering BitLocker Encrypted Drives Demonstration: How to Encrypt a Partition by Using BitLocker
What Is BitLocker?
A feature in Windows Server 2008 that allows you to encrypt entire partitions Benefits for BitLocker are: Data protection for stolen drives Safe shipping of preconfigured servers Easier decommissioning of drives Maintaining system integrity
www.technocorp.co.in
www.technocorp.co.in
www.technocorp.co.in
In Active Directory
In this demonstration, you will see how to: Install the BitLocker feature Configure Bitlocker to not require a TPM Enable BitLocker when a TPM is unavailable Access the recovery password
www.technocorp.co.in
www.technocorp.co.in
In this demonstration, you will see how to: Create a shared printer Create a second printer using the same port Increase the priority of the second printer
www.technocorp.co.in
A printer pool: Increases availability and scalability Requires all printers be the same model Requires all printers in the same location
www.technocorp.co.in
www.technocorp.co.in
5 min
Exercise 1: Creating and Configuring a File Share Exercise 2: Encrypting and Recovering Files Exercise 3: Creating and Configuring a Printer Pool
Logon information
Lab Scenario
You are configuring a new file server that will hold files shared by multiple departments. The first two departments to move their files to this location are the Marketing and Production departments. You need to configure the file share so that each department has access to view and modify only their own files. In addition, users should not see files and folder that they do not have access to. Your organization would like to allow users to start encrypting files by using EFS. However, there are concerns about recoverability. To enhance the management of the certificates used for EFS, you are going to configure an internal certification authority to issue certificates to users. You will also configure a recovery agent for EFS and verify that the recovery agent can recover files. The Marketing department has a single central copy room that stores the printer for the entire floor. Over the last year, the capacity of your printer has become a concern. In particular, when a user prints a large job, it prevents other users from obtaining their print jobs for 10 or 15 minutes. To resolve this problem, you have purchased two new identical printers to configure as a printer pool for the Marketing department. www.technocorp.co.in
Lab Review
www.technocorp.co.in
In Exercise 1, why did Adam only see the Marketing folder? In Exercise 2, why was the Administrator account able to open the encrypted file? When two ports are enabled for a printer, how do you know where a print job will be directed?